0% found this document useful (0 votes)
31 views17 pages

First Sem

The document covers various topics related to computer science and technology, including software types, encryption, firewalls, operating systems, and network topologies. It explains key concepts such as e-commerce, email structure, IP addresses, and the internet's applications. Additionally, it discusses web technologies like search engines, web browsers, and URLs, providing foundational knowledge for understanding digital communication and networking.

Uploaded by

proplayerharish6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views17 pages

First Sem

The document covers various topics related to computer science and technology, including software types, encryption, firewalls, operating systems, and network topologies. It explains key concepts such as e-commerce, email structure, IP addresses, and the internet's applications. Additionally, it discusses web technologies like search engines, web browsers, and URLs, providing foundational knowledge for understanding digital communication and networking.

Uploaded by

proplayerharish6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

1.

software and types


2.encryption and its importance
3.firewall and its importance and types
4.diff b/w LAN man WAN
5.WHAT is operating system? Functios OS
6.role of input and output devices
7.ecommerce and types
8.digilocker,arogyasethu app,netetiquitee
9.network topologies
10.types of memory
11,mail merge
12.E-wallet,pos,NEFT,RTGS,IMPS
13.EMAIL STRUCTURE OF EMAIL
14. Difference between IP ADDRESS AND MAC ADDRESS
15.what is ip address and its types
16.what is internet? Write applications of internet
17.difference between internet,intranet and extranet

1
1.WHAT IS SOFTWARE? TYPES OF SOFTWARE(APPLICATION S/W,SYSTEM S/W,UTILITY S/W)

Utility Software
The Utility Software is system
software that helps to maintain the
proper and smooth functioning of a
Computer System. It assists the
Operating System to manage, organize,
maintain, and optimize the functioning
of the computer system. EG. ANTI-
VIRUS,disk cleanup tool

2
…………………………………………………

2.

………………………….

3.firewall and importance

A Firewall is a network security device that monitors and filters incoming and outgoing
network traffic based on an organization's previously established security policies. At its
most basic, a firewall is essentially the barrier that sits between a private internal network
and the public Internet.

Types

 Network-Based Firewall. A network-based firewall routes traffic between networks. ...


 Application Firewall. An application firewall (also called an application layer firewall) works
with the TCP/IP stack to filter and intercept all traffic packets to/from apps. ...
 Proxy Server.
Benefits of firewall
 Monitoring and Filtering Network Traffic. A firewall's primary role is to oversee all
data packets that traverse a network. ...
 Preventing Virus Infiltration. ...
 Blocking Unauthorized Access. ...
 Upholding Data Privacy. ...
Supporting Regulatory Compliance………………………………………………

3
4.LAN,MAN,
WAN

5.Operating system
It basically manages all the resources of the computer. An operating system
acts as an interface between the software and different parts of the computer or
the computer hardware. The operating system is designed in such a way that it
can manage the overall resources and operations of the computer.
Functions/key features of operating system
Memory Management
The operating system is in charge of managing the primary memory, often known as the main
memory. The main memory consists of a vast array of bytes or words, each of which is allocated an
address. Main memory is rapid storage that the CPU can access directly. A program must first be
loaded into the main memory before it can be executed.
Process Management
The operating system determines which processes have access to the processor and how much
processing time every process has in a multiprogramming environment. Process scheduling is the
name for this feature of the operating system.
Device Management
A file system is divided into directories to make navigation and usage more efficient. Other
directories and files may be found in these directories. The file management tasks performed by an
operating system are: it keeps track of where data is kept, user access settings, and the state of each
file, among other things.
File Management
An operating system’s (OS) primary function is to manage files and folders.
Operating systems are responsible for managing the files on a computer. This includes creating,
opening, closing, and deleting files. The operating system is also responsible for organizing the files
on the disk.
………………………………………
6. role of input/output devices

4
7.What is e-commerce?
E-commerce (electronic commerce) is the buying and selling of goods and services, or the
transmitting of funds or data, over an electronic network, primarily the internet

………………………………….

8. digilocker, Netiquette,arogya sethu app


You can use it to store important and official documents such as educational certificates, birth
certificates, PAN cards, Aadhaar cards, Passports and Voter IDs on your mobile phone. You can also
sign into digilocker.gov.in using a web browser.

arogya sethu app

5
9.network topologies

Network topology refers to the arrangement of different elements


like nodes, links, and devices in a computer network. It defines how
these components are connected and interact with each other.

…………………………………………………………………….

10.types of memory

6
…………………………………………………………………

11.mail merge
Mail merge entails combining mail and letters and pre-addressed envelopes or mailing labels for
mass mailings from a form letter. In other words, it is the automatic addition of names and
addresses from a database to letters and envelopes This feature is usually employed in a word
processor.

Steps to perform a mail merge:

1. Prepare data of names and addresses in Excel data sheet for mail merge.

2. Then, in a new blank word document start mail merge.

3. Insert a merge field.

4. Preview and finish the mail merge

5. Save your mail merge.


……………………………………..
12.E-wallet,pos,NEFT,RTGS,IMPS

An E-Wallet, also known as an electronic wallet or mobile wallet, goes a long way towards
facilitating frictionless purchases. Mobile wallets use near-field communications technology to
enable consumers to make contactless payments using their mobile device, tablet or smart watch
instead of using a physical card. Unlike a digital wallet where the money remains in the bank
account, an E-Wallet is preloaded with money which is then used for transactions.

E-Wallets work just like a physical wallet, containing not only credit card and debit card data, but
potentially loyalty card data, digital coupons, airline boarding passes and even driving licence
information. An E-Wallet can make secure payments both online and in a physical store without the
need to memorise individual passwords. Digital wallets only store payment information,
communicating with your bank account to process transactions, whereas E-Wallets process the
transaction directly.

7
POS
Point of Sale (POS) is where a customer completes the purchase of goods or services. These
transactions at the cash register in physical stores are crucial for the banking and retail industries.
In banking, it is the moment when a customer initiates a transaction using their debit or credit
card during physical shopping.

Point-of-sale transactions are the secret to making payments go as smoothly as possible. They
make the process of exchanging goods and services faster and more efficient. Let's break down
the steps that make it all happen.

1. Selection of Items: The process starts with the customer picking out what they want to
purchase.
2. Scanning or Manual Entry: The items are scanned with barcode scanners, or the info is
entered manually.
3. Payment Processing: Customers pay with their debit or credit card, mobile wallet, or
cash.
4. Authorisation: The transaction data is then shared with the bank to ensure the money is
safe.
5. Receipt Generation: A receipt is generated for the customer to show the successful
transaction.

NEFT RTGS IMPS

8
13.EMAIL AND ITS STRUCTURE
Email stands for Electronic Mail. It is a method to send messages from one computer to another
computer through the Internet. It is mostly used in business, education, technical communication,
and document interactions. It allows communicating with people all over the world without
bothering them. In 1971, a test email was sent Ray Tomlinson to himself containing text.
It is the information sent electronically between two or more people over a network. It involves a
sender and receiver/s.
Format of E-mail :
An e-mail consists of three parts that are as follows :
1. Envelope
2. Header
3. Body
1. Envelope :
The envelope part encapsulates the message. It contains all information that is required for
sending any e-mail such as destination address, priority and security level. The envelope is used
by MTAs for routing message.
2. Header :
The header consists of a series of lines. Each header field consists of a single line of ASCII text
specifying field name, colon and value. The main header fields related to message transport are :
1. To: It specifies the DNS address of the primary recipient(s).
2. Cc : It refers to carbon copy. It specifies address of secondary recipient(s).
3. BCC: It refers to blind carbon copy. It is very similar to Cc. The only difference between Cc
and Bcc is that it allow user to send copy to the third party without primary and secondary
recipient knowing about this.
4. From : It specifies name of person who wrote message.
5. Sender : It specifies e-mail address of person who has sent message.
6. Received : It refers to identity of sender’s, data and also time message was received. It also
contains the information which is used to find bugs in routing system.
7. Return-Path: It is added by the message transfer agent. This part is used to specify how to get
back to the sender.
3. Body:- The body of a message contains text that is the actual content/message that needs to be
sent, such as “Employees who are eligible for the new health care program should contact their
supervisors by next Friday if they want to switch.” The message body also may include
signatures or automatically generated text that is inserted by the sender’s email system.
Advantages of E-mail :
1. E-mails provides faster and easy mean of communication. One can
send message to any person at any place of world by just clicking
mouse.
2. Various folders and sub-folders can be created within inbox of mail,
so it provide management of messages.
3. It is effective and cheap means of communication because single
message can be send to multiple people at same time.
4. E-mails are very easy to filter. User according to his/her priority can
prioritize e-mail by specifying subject of e-mail.
5. E-mail is not just only for textual message. One can send any kind of
multimedia within mail.
6. E-mail can be send at any hour of day, thus ensures timeliness of
message.
7. It is secure and reliable method to deliver our message.
9
14. IP ADDRESS AND MAC ADDRESS

……………………………………………………………

15.An IP address, or Internet Protocol address, is a unique numeric label


assigned to every device connected to the internet

 Purpose
IP addresses identify and locate network devices, and allow them to send and
receive information
 Types
There are two main versions of IP addresses: IPv4 and IPv6
 How it works
IP addresses work like a language, with set guidelines for communicating
information between devices

10
16.The Internet is a global web of computers connected to each other by wires,
(mostly phone lines). If you look at a map of big cities, smaller towns, and scattered
houses, each is connected together with roads, railways, etc.. This is similar to the
Internet, except with the Internet, wires connect computers. The Internet is a superhighway

 Communication
The internet allows people to chat with friends and family, email, and video conference.
 Research
The internet is used by scientists to calculate the speed and gravity of the earth, and to
design and move satellites into space.
 Education
Teachers use the internet and projectors to teach students in schools and colleges.
 Shopping
The internet allows people to shop from home.
 Gaming
The internet offers a wide selection of games that can be played independently or with
other internet users.
 Health
The internet of things (IoT) allows doctors to monitor patients' conditions in real time using
wearables or sensors connected to patients.
 Agriculture
IoT can be used to monitor soil health and moisture, optimize irrigation, and improve crop
management.etc
………………………………………………………………………..
17.internet,intranet and extranet

11
BOOK NO 2: web internet technologies 11.DEFINE a) search engine
b)web browsers And c)WWW D)urL E)ISP F) IMEI g)Hyperlinks h)homepage
i)uploading j)downloading k)webpage and website l) dynamic webpage and
static webpage m)http and https n) SET and SSL
a)Search engines are the software program that provides information according to the user
query. It finds various websites or web pages that are available on the internet and gives related
results according to the search. To rank well on a Search Engine, it’s important to know What are
Search engines and how they work.

b)The web browser is an application software to explore www (World Wide Web). It provides
an interface between the server and the client and it requests to the server for web documents and
services. It works as a compiler to render HTML which is used to design a webpage. Whenever
we search for anything on the internet, the browser loads a web page written in HTML, including
text, links, images, and other items such as style sheets and JavaScript functions. Google Chrome,
Microsoft Edge, Mozilla Firefox, and Safari are examples of web browsers.

c)The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public
websites or pages that users can access on their local computers and other devices through
the internet. These pages and documents are interconnected by means of hyperlinks that users
click on for information. This information can be in different formats, including text, images,
audio and video.

12
D)URL

URL - Uniform Resource Locator


Web browsers request pages from web servers by using a URL.
The URL is the address of a web page, like: https://www.w3schools.com. A URL, short for a
uniform resource locator is a web address pointing to a specific website, a web page, or a document
on the internet. A URL
consists of ten
parts: the scheme,
subdomain, top-level
domain, second-level
domain, subdirectory,
parameter, port, path,
query, and fragment.
While a URL doesn't
have to contain all of
these parts at once, it
will always have at
least three of them.

E)ISP

An internet service provider (ISP) is a company that provides access to the


internet. ISPs can provide this access through multiple means, including dial-up,
DSL, cable, wireless and fiber-optic connections.

F)IMEI

The IMEI (International Mobile Equipment Identity) number is a unique 15-digit


serial number for identifying a device; every mobile phone in the world has one.
These IMEI numbers are stored in a database called the EIR (Equipment Identity
Register), which contains information about all valid mobile phone equipment.
This is because the EIR’s job is to check that every phone call or SMS sent is

13
from a mobile phone authorized to use a mobile network, which it does using the
IMEI number.

Therefore, if you have a working mobile phone connected to a mobile network,


your phone is already registered.
The IMEI number reveals details about a phone without having to physically have
it, including the brand and model, year of release, and other specifications.
For this reason, your insurance company or new phone provider may want to
know your IMEI number to create an insurance policy. Your new mobile operator
may need it to unlock the device from your old provider.

How do I find the IMEI number?


The easiest way to check IMEI on a smartphone is to dial *#06#, after which the
number should appear on the screen. Dual-SIM phones show two IMEI numbers
— one for each SIM slot. It is a good idea to write down the mobile device’s IMEI
number and keep it safe if you need to report it.
The IMEI number can also be found in several other places, including Settings
and the original packaging.

…………………………………………………………………………

g)Hyperlinks

Alternatively known as a link and web link, a hyperlink is an icon, graphic, or


text that links to another file or object. The World Wide Web is comprised of
hyperlinks linking trillions of pages and files to one another. For example,
"Computer Hope home page" is a hyperlink to the Computer Hope home page.

Why are hyperlinks used on web pages?

Hyperlinks allow web pages to connect to other web pages; without them, you
would need to know the URL (Uniform Resource Locator) for every page on the
Internet. For example, you likely got to this page from a hyperlink and didn't
type "https://www.computerhope.com/jargon/h/hyperlink.htm" into your
browser address bar

………………………………………..

h)Homepage term is often used for the website's first page which user visits
when they access the website. The homepage is consists of overview of the
website and provides the navigation for different services in the website.
When you search for a website on the internet you get the way to it's
homepage. It is not same as a Landing page which is used for specific business
needs and search engine optimization.
14
The home page's primary goal is to make the visitor feel welcome, and then
provide information and navigation about what can be found on the site. The best
homepage is the one that serves this primary purpose the best.

………………………….

i)uploading j)downloading

Uploading means transferring data from your computer to the Internet. Here, the
computer is the client, and the Internet is the server.

Downloading means transferring the data from the Internet to your computer. The
computer is the server, and the Internet is the client.

………………

15
16
………………………..

17

You might also like